1 / 19

Application Hosting Customer Workshop

Application Hosting Customer Workshop. November 2, 2010. David Updike, Acting Director National Computer Center. Welcome & Thank You. Thank you …..for taking the time to join us as we review NCC plans to Enhance EPA hosting technology and Improve NCC service delivery

yorick
Download Presentation

Application Hosting Customer Workshop

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Application Hosting Customer Workshop November 2, 2010 David Updike, Acting Director National Computer Center

  2. Welcome & Thank You Thank you …..for taking the time to join us as we review NCC plans to Enhance EPA hosting technology and Improve NCC service delivery Thank you …..for providing your honest and candid feedback in these sessions Thank you…..for being our customer We appreciate the opportunity to work with and help you solve your hosting needs

  3. We Have an Exciting Agenda

  4. So Now….Having Your Head in the Clouds is a Good Thing!

  5. EPA’s Cloud Targets • EPA & NCC are moving rapidly toward cloud services • Now— • Much of hosting already leveraging cloud technologies • You will learn more about that today • Within 2011 • Brokered external cloud services for some low sensitivity applications • Within 2012 • Private cloud services across four EPA data centers for EPA medium sensitivity applications • High availability and/or disaster recovery across EPA’s four primary data centers

  6. Cloud Services & EPA CPICs • EPA will have a standard approach for engaging cloud services • OEI will develop the approach in 2011 • Customers will be engaged in the approach development • OEI will provide Agency standard language for CPICs to address cloud services integration

  7. EPA Data Center Goals • Scalability • Availability • Reliability • Affordability • Maximize Virtualization • Minimize Carbon Footprint • Service Based & Automated

  8. Network Optimization • Again—We’ve got our head in the cloud • WAN 2010 migration in progress • Cloud Services for • WAN Backbone • Edge Security • Increased bandwidth for many sites— & room to grow

  9. Email Optimization Initiative • Moves email from approximately 200 servers distributed Agency-wide to approximately 20 servers in the four primary data centers • Establishes baseline infrastructure for integrated EPA private cloud in EPA’s four primary data centers • Migration complete in August 2011

  10. Email Optimization Service Areas* Port Orchard, WA Seattle, WA Olympia, WA Anchorage, AK Chelmsford, MA Boston, MA Narragansett, RI Newport, OR Portland, OR Corvallis, OR Helena, MT Duluth, MN Grosse Ile, MI Ann Arbor, MI New York, NY Edison, NJ Philadelphia, PA Boise, ID Denver, CO NEIC, Lakewood CO Cincinnati, OH – Norwood, AWBERC Potomac Yard San Francisco, CA Region 5 (Chicago) Ft. Meade, MD Annapolis, MD Erlanger, KY Potomac Yard Federal Triangle Region 8 (Denver) Kansas City, KS RTP, NC Chapel Hill, NC Las Vegas, NV – UNLV RTP Ada, OK Athens, GA Atlanta, GA Montgomery, AL Dallas, TX - OER/COOP Gulf Breeze, FL Stennis Space Center, MS Puerto Rico *Initial plan subject to change

  11. Email Optimization Objectives • Email Optimization will • Improve service delivery and provide a seamless experience regardless of organization or location within EPA • Improve performance and portability for remote workers • Control costs of email storage growth • Reduce environmental impact of Email hosting

  12. Back on the Ground …. We Need to Focus Jointly on Integrating and Improving our Security Awareness & Response 13

  13. The security threat is real Well organized and funded government and terrorist organizations are aggressively attacking commercial, federal and EPA IT resources to: Acquire confidential information Establish privileged access to government IT resources Commonly referred to as Advanced Persistent Threat (APT) Integrated Security Awareness and Response is required to ensure the continued protection of our information and infrastructure resources Integrated Security Awareness & Response 14

  14. EPA must establish increasingly proactive, integrated and automated approaches to: Configuration management Security surveillance Incident response EPA applications and infrastructure must integrate with EPA security management platforms Integrated authentication and access control for applications and infrastructure Common log analysis platforms (ArcSight) Integrated IT management platforms for: System Configuration, Software Distribution and Vulnerability Management (BigFix) Desktop/Laptop & Server Security (Symantec Endpoint Protection) Integrated Security Awareness & Response 15

  15. Integrated Security Awareness & Response • Partnership Involvement • All EPA Regions, Program Office Security Staff and Senior Information Officials (SIOs) asked to heighten security awareness and monitoring activities. • Increased operations security coordination within OTOP • EPA application owners must: • Establish baselines for expected and usual behavior • Continuously monitor and report unexpected or unusual behavior • No local connections to the Internet or other networks • EPA network communication must comply with Federal Trusted Internet Connection requirements • All EPA network communications, applications & devices must be visible to EPA’s Network Security and Operations Center (NSOC) monitoring systems

  16. Log Reviews Roles and Responsibilities • For NCC hosted applications, NCC provides the audit log reviews and anomalous behavior reporting for all logs through the application platform • Application owners must define what is usual and unusual for their applications and alert CSIRC • This may require event logging within your custom application • Application owners who manage their own user authentication and access control are responsible for reviewing and alerting unauthorized access

  17. Log Review Roles and Responsibilities NCC Hosted Audit/Log Category Site Hosted (internal org.) (external) Application Owner Responsibility Customer Application Customer Application Management User Access & Authentication WAM Application Platform Application Platform Management Server OS Server Application Owner Responsibility Application Owner Responsibility Management Management Server Storage Storage & Management Back - Up Network Network Management Facilities Computer Management Rooms Pg 1

  18. Contacts: David Updike Acting Director, National Computer Center Updike.David@epa.gov 919-541-0780 Tim Thorpe, Acting Associate Director, National Computer Center Thorpe.Tim@epa.gov 919-541-0613 John Gibson Acting Security and Business Management Branch Chief, National Computer Center Gibson.John@epa.gov 919-541-0112

More Related